Routers play many different roles during incidents. They can be targets of attack, stepping-stones for attackers, or tools for use by investigators. They can provide valuable information and evidence that allow investigators to resolve complex network incidents.
Routers lack the data storage and functionality of many of the other technologies we have examined in previous chapters, and thus they are less likely to be the ultimate target of attacks. (One notable exception is that routers are targets during denial-of-service attacks, which we will examine closely.) Routers are more likely to be springboards for attackers during network penetrations. The information stored on routers—passwords, routing tables, ...